The Bluetooth Classic implementation on Actions ATS2815 and ATS2819 chipsets does not properly handle the reception of multiple LMP_host_connection_req packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device via crafted LMP packets. Manual user intervention is required to restart the device and restore Bluetooth communication.
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
Link | Tags |
---|---|
https://www.actions-semi.com/index.php?id=3581&siteId=4 | broken link vendor advisory |
https://launchstudio.bluetooth.com/ListingDetails/76427 | third party advisory |
https://dl.packetstormsecurity.net/papers/general/braktooth.pdf | third party advisory technical description |